EP3035641A1 - Method for file upload to cloud storage system, download method and device - Google Patents
Method for file upload to cloud storage system, download method and device Download PDFInfo
- Publication number
- EP3035641A1 EP3035641A1 EP14794751.9A EP14794751A EP3035641A1 EP 3035641 A1 EP3035641 A1 EP 3035641A1 EP 14794751 A EP14794751 A EP 14794751A EP 3035641 A1 EP3035641 A1 EP 3035641A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- file
- key
- cloud storage
- storage system
- data file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Definitions
- the present invention relates to the technical field of uploading files to a cloud storage system, and more particularly, to a method for uploading files to a cloud storage system, a downloading method and device.
- cloud storage users can upload their files to the cloud storage environment for the cloud storage service provider to carry out the file management, and designate access rights to other users for accessing the files, thus achieving the file sharing.
- the cloud storage environment makes the data owners lose complete control of the data, which makes the data security face a series of threats, such as: DOS attacks using large-scale botnets, attacks exploiting vulnerabilities of operating systems or application service protocols, as well as malicious attacks, theft and illegal misuse target the user privacy information stored in the "cloud", etc., and there are various means for that.
- various systems and applications residing in the "cloud” still have to face threats such as viruses, Trojans and other malicious software tools which are faced in the traditional stand-alone machine or intra-net environment. If sensitive data (including: financial documents, personal medical records) are stored in a cloud storage environment controlled by others, the above mentioned problems will become more serious with the number of users who share the storage increasing. Therefore, systems based on cloud storage services have very urgent needs for security mechanisms.
- the embodiment of the present invention is to provide a method for uploading files to a cloud storage system, a downloading method and device, to solve the problem in the related art that data storage security in a cloud storage system is relatively poor.
- the file information comprises: a file name, a file identifier and a last modification time extracted from the original data file.
- the step of performing a security processing on an original data file according to the file key and generating a secure data file comprises:
- an encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key; a key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key.
- a method for downloading files from a cloud storage system comprising:
- the related file information comprises: a secure metadata file.
- the secure metadata file comprises one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list.
- the step of performing a security analysis processing on the secure data file based on the file key comprises:
- a device for uploading files to a cloud storage system applied to a client end, and comprising a first generating module, a first processing module and an uploading module, wherein:
- a device for downloading files from a cloud storage system comprising a downloading module, a second generating module and a second processing module, wherein:
- the method for uploading files to a cloud storage system in accordance with an embodiment of the present invention provides an end-to-end confidentiality and integrity protection for data stored by a user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- the method for uploading files to a cloud storage system in accordance with an embodiment of the present invention is applied to the client end and comprises:
- the method for uploading files to the cloud storage system in accordance with the embodiment of the present invention, firstly, when the user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- the file key is generated based on a pre-generated user key and at least file information
- the following specific embodiments are used for illustration rather than limitation:
- the file information includes but is not limited to: a file name, a file identifier, and optionally, a last modification time extracted from the original data file.
- the user information may be a user name, a user identifier, and so on, which are not enumerated herein.
- the information input by the user can be password information.
- the step of performing a security processing on the original data file based on the file key and generating a secure data file comprises:
- the encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key;
- the key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key.
- part or all of the content of the original data file is encrypted based on the file key, and/or integrity protection processing is performed; keys used in the encryption and integrity protection may be different; the processing order of the encryption and the integrity protection is not restricted, the encryption may be performed first, and then integrity protection is performed on the cipher text; or integrity protection is performed on the original data file first, and then encryption is performed.
- the secure data file and the information for generating the file key, except of the user key, are sent to the cloud storage system to improve the data storage security.
- the embodiment of the present invention further provides a method for downloading files from the cloud storage system, comprising:
- the secure data file sent by the cloud storage system according to the downloading request is received, and then a file key is generated, a security analysis processing is performed on the secure data file according to the file key, so as to solve the problem that the data storage security in the cloud storage system is relatively poor.
- the related file information comprises: a secure metadata file.
- the secure metadata file may comprise one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list.
- the secure metadata file comprises a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list, but what is shown in FIG. 3 is only an example of the secure metadata file, the content and format of the secure metadata file are not limited to the content and format shown in FIG.
- the secure metadata file may also comprise: the file name, the file identifier, the file owner identifier, the last modification time, the security processing time, the random information, the security parameter and the access control list; the secure metadata file may further comprise other content.
- the information contained in the secure metadata file can be used to generate the file key.
- the security processing time is the current time for generating a file key based on the original data file and performing a security processing.
- the security parameter is a public parameter that needs to be used in the security processing and security analysis processing.
- the security parameter can be a parameter of the cryptosystem based on the Discrete Logarithm Problem, including but not limited to the discrete logarithm problem in the Finite field and the discrete logarithm problem on Elliptic Curve.
- the random information is used for increasing the randomness of the generated file key.
- the security parameter comprise the group order p and the group generator g
- the random information is gy, where y is a random number from 1 to p-1
- the user key is x
- x is the output of the one-way function KDF after inputting information such as FileInfo, UserInfo, TimeInfo, Secret
- the FileInfo comprises file information such as the file name, the file identifier and/or the last modification time
- the UserInfo is the user information
- the TimeInfo is the current time
- the Secret is the user key
- the KDF is the hash function (such as SHA2) in the cryptographic security or the key derivation function
- the generated file key is gyx.
- the access control list is used to record the access permission of the original data file, it may comprise a user name and an ACL entry that are used to identify a user having the access permission.
- the ACL entry comprises a protection-processed file key, the protection processing may be encrypting the file key or a way described in the following specific embodiment:
- step 202 the step of generating a file key is specifically:
- the step of performing a security analysis processing on the secure data file based on the file key comprises:
- the method for downloading files from the cloud storage system in accordance with the embodiment of the present invention provides users with an end-to-end confidentiality and integrity protection and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- the embodiment of the present invention further provides a device for uploading files to a cloud storage system, applied to a client end, and comprising:
- the abovementioned first generating module 401 may be configured to: generate the file key based on the pre-generated user key and at least the file information; for example, generate the file key based on the pre-generated user key and file information, as well as the obtained user information, the current time, and the random information generated by the client end itself.
- the file information includes but is not limited to: the file name and the file identifier, extracted from the original data file, and optionally, a last modification time.
- the first processing module 402 is configured to: encrypt part or all of the content of the original data file, and/or perform an integrity protection processing on the original data file.
- the encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key; the key used for performing an integrity protection processing on the original data file is: the file key or a second derived key derived based on the file key.
- the first derived key and the second derived key may be different keys.
- the uploading module can also be configured to: further send information used to generate the key file, except of the user key, to the cloud storage system.
- the device for uploading files to the cloud storage system in accordance with the embodiment of the present invention is a device corresponding to the abovementioned method for uploading files to the cloud storage system, all implementations in the abovementioned method are applicable to the device embodiments to similarly achieve: providing users with an end-to-end confidentiality and integrity protection and solving the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- the embodiment of the present invention further provides a device for downloading files from a cloud storage device, comprising:
- the downloading module 501 is further configured to: receive related file information sent by the cloud storage system based on the downloading request.
- the abovementioned second generating module 502 is configured to: generate the file key based on the pre-generated user key and at least the file information, for example, generate the file key based on the pre-generated user key and the file information, as well as the obtained user information, the current time, and the random information generated by the client end itself.
- the second process module 503 is configured to: decrypt some or all of the content of the secure data file, and/or perform an integrity protection verification processing on the secure data file.
- the key used for decrypting part or all the content of the secure data file and the key used for performing the integrity protection verification processing on the secure data file may be different keys.
- the device for downloading files from a cloud storage in accordance with the embodiment of the present invention provides users with an end-to-end confidentiality and integrity protection and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- the device for downloading files from the cloud storage system is a device corresponding to the abovementioned downloading method, wherein all implementations in the downloading method embodiments are suitable for the downloading device embodiments to achieve the similar technical effect.
- the present invention With the method for uploading files to cloud storage system in accordance with the embodiment of the present invention, when a user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor. Therefore the present invention has strong industrial applicability.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
- The present invention relates to the technical field of uploading files to a cloud storage system, and more particularly, to a method for uploading files to a cloud storage system, a downloading method and device.
- With the rapid development of cloud storage, more and more people or services start choosing to use the cloud storage environment for storing their data, cloud storage users can upload their files to the cloud storage environment for the cloud storage service provider to carry out the file management, and designate access rights to other users for accessing the files, thus achieving the file sharing.
- However, the cloud storage environment makes the data owners lose complete control of the data, which makes the data security face a series of threats, such as: DOS attacks using large-scale botnets, attacks exploiting vulnerabilities of operating systems or application service protocols, as well as malicious attacks, theft and illegal misuse target the user privacy information stored in the "cloud", etc., and there are various means for that. In addition, various systems and applications residing in the "cloud" still have to face threats such as viruses, Trojans and other malicious software tools which are faced in the traditional stand-alone machine or intra-net environment. If sensitive data (including: financial documents, personal medical records) are stored in a cloud storage environment controlled by others, the above mentioned problems will become more serious with the number of users who share the storage increasing. Therefore, systems based on cloud storage services have very urgent needs for security mechanisms.
- To solve the technical problem, the embodiment of the present invention is to provide a method for uploading files to a cloud storage system, a downloading method and device, to solve the problem in the related art that data storage security in a cloud storage system is relatively poor.
- To solve the abovementioned technical problem, the following technical solution is used:
- a method for uploading files to a cloud storage system, applied to a client end, and comprising:
- generating a file key;
- performing a security processing on an original data file according to the file key and generating a secure data file;
- sending the secure data file to a cloud storage system.
- Alternatively, the step of generating a file key comprises:
- generating the file key based on a pre-generated user key and file information.
- Alternatively, the file information comprises: a file name, a file identifier and a last modification time extracted from the original data file.
- Alternatively, the step of performing a security processing on an original data file according to the file key and generating a secure data file comprises:
- encrypting part or all of content of the original data file, and/or performing an integrity protection processing on the original data file.
- Alternatively, an encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key;
a key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key. - Alternatively, it further comprises:
- sending information for generating the file key, except of the user key, to the cloud storage system.
- A method for downloading files from a cloud storage system, comprising:
- receiving a secure data file sent by a cloud storage system based on a downloading request;
- generating a file key;
- performing a security analysis processing on the secure data file based on the file key.
- Alternatively, it further comprises:
- receiving related file information sent by the cloud storage system based on the downloading request.
- Alternatively, the related file information comprises: a secure metadata file.
- Alternatively, the secure metadata file comprises one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list.
- Alternatively, the step of performing a security analysis processing on the secure data file based on the file key comprises:
- decrypting some or all of content of the secure data file, and/or performing an integrity protection verification processing on the secure data file.
- A device for uploading files to a cloud storage system, applied to a client end, and comprising a first generating module, a first processing module and an uploading module, wherein:
- the first generating module is configured to: generate a file key;
- the first processing module is configured to: perform a security processing on an original data file based on the file key and generate a secure data file;
- the uploading module is configured to: send the secure data file to a cloud storage system.
- A device for downloading files from a cloud storage system, comprising a downloading module, a second generating module and a second processing module, wherein:
- the downloading module is configured to: receive a secure data file sent by a cloud storage system based on a downloading request;
- the second generating module is configured to: generate a file key;
- the second processing module is configured to: perform a security analysis processing on the secure data file based on the file key.
- The beneficial effects of the abovementioned technical solution are as follows:
- With the method for uploading files to cloud storage system in accordance with the embodiment of the present invention, when a user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
-
-
FIG. 1 is a flow chart of a method for uploading files to a cloud storage system in accordance with an embodiment of the present invention; -
FIG. 2 is a flow chart of a method for downloading files from a cloud storage system in accordance with an embodiment of the present invention; -
FIG. 3 is a block diagram of a secure metadata file in accordance with an embodiment of the present invention; -
FIG. 4 is a block diagram of a device for uploading files to a cloud storage system in accordance with an embodiment of the present invention; -
FIG. 5 is a block diagram of a device for downloading files from a cloud storage in accordance with an embodiment of the present invention. - Hereinafter, in conjunction with the accompanying drawings and specific embodiments, the present invention will be described in detail.
- The method for uploading files to a cloud storage system in accordance with an embodiment of the present invention provides an end-to-end confidentiality and integrity protection for data stored by a user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- As shown in
FIG. 1 , the method for uploading files to a cloud storage system in accordance with an embodiment of the present invention is applied to the client end and comprises: - in
step 101, it is to generate a file key; - in
step 102, it is to perform a security processing on the original data file based on the file key and generate a secure data file; - in
step 103, it is to send the secure data file to the cloud storage system. - In the method for uploading files to the cloud storage system in accordance with the embodiment of the present invention, firstly, when the user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- In the
abovementioned step 101, the file key is generated based on a pre-generated user key and at least file information, the following specific embodiments are used for illustration rather than limitation: - in a specific embodiment, the file key is generated based on the user key, the file information, and user information such as the user name, the user identifier and the current time obtained by the client end;
- in a specific embodiment, the file key is generated based on the user key, the file information, as well as the user information such as the user name and the user identifier obtained by the client end, and the random information generated by the client end itself.
- Wherein, the file information includes but is not limited to: a file name, a file identifier, and optionally, a last modification time extracted from the original data file.
- In a specific embodiment of the present invention, the user information may be a user name, a user identifier, and so on, which are not enumerated herein. Wherein, the information input by the user can be password information.
- In the
abovementioned step 102, the step of performing a security processing on the original data file based on the file key and generating a secure data file comprises: - encrypting part or all of the content of the original data file, and/or performing an integrity protection processing on the original data file.
- Specifically, the encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key; the key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key.
- The method for uploading files to the cloud storage system in accordance with an embodiment of the present invention may further comprise:
- sending information for generating the file key, except of the user key, to the cloud storage system.
- In the following, the specific embodiment of the present invention will be described as follows:
- when the user uploads files to the cloud storage system at the client end, first, a file key is generated based on the user key pre-generated by the client end and the file information extracted from the original data file; wherein, the file information, as well as the user information, the current time, and the random information used when generating the file key, can be all saved and transferred in the form of files;
- then part or all of the content of the original data file is encrypted based on the file key, and/or integrity protection processing is performed; keys used in the encryption and integrity protection may be different; the processing order of the encryption and the integrity protection is not restricted, the encryption may be performed first, and then integrity protection is performed on the cipher text; or integrity protection is performed on the original data file first, and then encryption is performed.
- Finally, the secure data file and the information for generating the file key, except of the user key, are sent to the cloud storage system to improve the data storage security.
- As shown in
FIG. 2 , the embodiment of the present invention further provides a method for downloading files from the cloud storage system, comprising: - in
step 201, it is to receive a secure data file sent by the cloud storage system based on a downloading request; - in
step 202, it is to generate a file key; - in
step 203, it is to perform a security analysis processing on the secure data file based on the file key. - In the method for downloading files from the cloud storage system in accordance with an embodiment of the present invention, when the user downloads files from the cloud storage system, firstly the secure data file sent by the cloud storage system according to the downloading request is received, and then a file key is generated, a security analysis processing is performed on the secure data file according to the file key, so as to solve the problem that the data storage security in the cloud storage system is relatively poor.
- The method for downloading files from the cloud storage system in accordance with an embodiment of the present invention further comprises:
- receiving related file information sent by the cloud storage system based on the downloading request.
- Wherein the related file information comprises: a secure metadata file. Specifically, the secure metadata file may comprise one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list. As the specific embodiment shown in
FIG. 3 , the secure metadata file comprises a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list, but what is shown inFIG. 3 is only an example of the secure metadata file, the content and format of the secure metadata file are not limited to the content and format shown inFIG. 3 , for example, the secure metadata file may also comprise: the file name, the file identifier, the file owner identifier, the last modification time, the security processing time, the random information, the security parameter and the access control list; the secure metadata file may further comprise other content. - In specific embodiments of the present invention, the information contained in the secure metadata file can be used to generate the file key. Wherein, the security processing time is the current time for generating a file key based on the original data file and performing a security processing. Wherein, the security parameter is a public parameter that needs to be used in the security processing and security analysis processing. Specifically, the security parameter can be a parameter of the cryptosystem based on the Discrete Logarithm Problem, including but not limited to the discrete logarithm problem in the Finite field and the discrete logarithm problem on Elliptic Curve. Wherein, the random information is used for increasing the randomness of the generated file key.
- In a specific embodiment, the security parameter comprise the group order p and the group generator g, the random information is gy, where y is a random number from 1 to p-1, the user key is x, where x is the output of the one-way function KDF after inputting information such as FileInfo, UserInfo, TimeInfo, Secret, wherein, the FileInfo comprises file information such as the file name, the file identifier and/or the last modification time, the UserInfo is the user information, the TimeInfo is the current time, the Secret is the user key, and the KDF is the hash function (such as SHA2) in the cryptographic security or the key derivation function, and the generated file key is gyx.
- In a specific embodiment of the present invention, the access control list is used to record the access permission of the original data file, it may comprise a user name and an ACL entry that are used to identify a user having the access permission. Wherein, the ACL entry comprises a protection-processed file key, the protection processing may be encrypting the file key or a way described in the following specific embodiment:
- assuming that the user IDz is a user having a file access permission recorded in the access control list, the file key of the secure data file is the abovementioned gyx, the ACL entry is (gz) yx, where the gz is the public key of the corresponding user IDz, and the z is the private key of the corresponding user IDz, then after the user receives a secure metadata file that contains the ACL entry, the user can recover the file key gyx based on the private key z, then perform a security analysis processing on the received secure data file based on the file key.
- In the
abovementioned step 202, the step of generating a file key is specifically: - generating the file key based on the pre-generated user key and at least the file information; for example, generating the file key based on the pre-generated user key and the file information, as well as the obtained user information, the current time, and the random information generated by the client end itself.
- In the
abovementioned step 203, the step of performing a security analysis processing on the secure data file based on the file key comprises: - decrypting some or all of the content of the secure data file, and/or performing an integrity protection verification processing on the secure data file. Wherein, the key used for decrypting part or all the content of the secure data file and the key used for performing the integrity protection check processing on the secure data file may be different keys.
- The method for downloading files from the cloud storage system in accordance with the embodiment of the present invention provides users with an end-to-end confidentiality and integrity protection and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- As shown in
FIG. 4 , the embodiment of the present invention further provides a device for uploading files to a cloud storage system, applied to a client end, and comprising: - A
first generating module 401, configured to generate a file key; - A
first processing module 402, configured to perform a security processing on an original data file based on the file key and generate a secure data file; - An
uploading module 403, configured to send the secure data file to the cloud storage system. - Wherein, in this embodiment, the abovementioned
first generating module 401 may be configured to: generate the file key based on the pre-generated user key and at least the file information; for example, generate the file key based on the pre-generated user key and file information, as well as the obtained user information, the current time, and the random information generated by the client end itself. - Wherein, the file information includes but is not limited to: the file name and the file identifier, extracted from the original data file, and optionally, a last modification time.
- Alternatively, the
first processing module 402 is configured to: encrypt part or all of the content of the original data file, and/or perform an integrity protection processing on the original data file. - Wherein, the encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key; the key used for performing an integrity protection processing on the original data file is: the file key or a second derived key derived based on the file key. Wherein, the first derived key and the second derived key may be different keys.
- In the device for uploading files to the cloud storage system in accordance with the embodiment of the present invention, the uploading module can also be configured to: further send information used to generate the key file, except of the user key, to the cloud storage system.
- The device for uploading files to the cloud storage system in accordance with the embodiment of the present invention is a device corresponding to the abovementioned method for uploading files to the cloud storage system, all implementations in the abovementioned method are applicable to the device embodiments to similarly achieve: providing users with an end-to-end confidentiality and integrity protection and solving the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- As shown in
FIG. 5 , the embodiment of the present invention further provides a device for downloading files from a cloud storage device, comprising: - A
downloading module 501, configured to receive a secure data file sent by the cloud storage system based on a downloading request; - A
second generating module 502, configured to generate a file key; - A
second processing module 503, configured to perform a security analysis processing on the secure data file based on the file key. - Wherein, in the downloading device, the
downloading module 501 is further configured to: receive related file information sent by the cloud storage system based on the downloading request. - Furthermore, the abovementioned
second generating module 502 is configured to: generate the file key based on the pre-generated user key and at least the file information, for example, generate the file key based on the pre-generated user key and the file information, as well as the obtained user information, the current time, and the random information generated by the client end itself. - The
second process module 503 is configured to: decrypt some or all of the content of the secure data file, and/or perform an integrity protection verification processing on the secure data file. Wherein, the key used for decrypting part or all the content of the secure data file and the key used for performing the integrity protection verification processing on the secure data file may be different keys. - The device for downloading files from a cloud storage in accordance with the embodiment of the present invention provides users with an end-to-end confidentiality and integrity protection and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor.
- It should be noted that the device for downloading files from the cloud storage system is a device corresponding to the abovementioned downloading method, wherein all implementations in the downloading method embodiments are suitable for the downloading device embodiments to achieve the similar technical effect.
- The above description is preferred embodiments of the present invention, and it should be noted that, for those ordinary skilled in the art, a number of improvements and modifications can also be made without departing from the principles of the present invention, and these improvements and modifications should also be considered as in the protection scope of the present invention.
- With the method for uploading files to cloud storage system in accordance with the embodiment of the present invention, when a user uploads a data file at the client end, firstly a file key is generated, and then a security processing is performed on the original data file based on the file key and a secure data file is generated, and then the secure data file is sent to the cloud storage system for storage. It provides an end-to-end confidentiality and integrity protection for data stored by the user in the cloud storage and solves the problem in the related art that the data storage security in the cloud storage system is relatively poor. Therefore the present invention has strong industrial applicability.
Claims (13)
- A method for uploading files to a cloud storage system, applied to a client end, and comprising:generating a file key;performing a security processing on an original data file according to the file key and generating a secure data file;sending the secure data file to a cloud storage system.
- The method for uploading files to a cloud storage system of claim 1, wherein, the step of generating a file key comprises:generating the file key based on a pre-generated user key and file information.
- The method for uploading files to a cloud storage system of claim 2, wherein, the file information comprises: a file name, a file identifier and a last modification time extracted from the original data file.
- The method for uploading files to a cloud storage system of claim I, wherein, the step of performing a security processing on an original data file according to the file key and generating a secure data file comprises:encrypting part or all of content of the original data file, and/or performing an integrity protection processing on the original data file.
- The method for uploading files to a cloud storage system of claim 4, wherein,
an encryption key used for encrypting part or all of the content of the original data file is: the file key or a first derived key derived based on the file key;
a key used for performing an integrity protection processing on the original data file is: the file key, or a second derived key derived based on the file key. - The method for uploading files to a cloud storage system of claim 1, further comprising:sending information for generating the file key, except of the user key, to the cloud storage system.
- A method for downloading files from a cloud storage system, comprising:receiving a secure data file sent by a cloud storage system based on a downloading request;generating a file key;performing a security analysis processing on the secure data file based on the file key.
- The method for downloading files from a cloud storage system of claim 7, further comprising:receiving related file information sent by the cloud storage system based on the downloading request.
- The method for downloading files from a cloud storage system of claim 8, wherein, the related file information comprises: a secure metadata file.
- The method for downloading files from a cloud storage system of claim 9, wherein, the secure metadata file comprises one or more of a file identifier, a file owner identifier, a file name, a last modification time, a security processing time, random information, a security parameter and an access control list.
- The method for downloading files from a cloud storage system of claim 7, wherein, the step of performing a security analysis processing on the secure data file based on the file key comprises:decrypting some or all of content of the secure data file, and/or performing an integrity protection verification processing on the secure data file.
- A device for uploading files to a cloud storage system, applied to a client end, and comprising a first generating module, a first processing module and an uploading module, wherein:the first generating module is configured to: generate a file key;the first processing module is configured to: perform a security processing on an original data file based on the file key and generate a secure data file;the uploading module is configured to: send the secure data file to a cloud storage system.
- A device for downloading files from a cloud storage system, comprising a downloading module, a second generating module and a second processing module, wherein:the downloading module is configured to: receive a secure data file sent by a cloud storage system based on a downloading request;the second generating module is configured to: generate a file key;the second processing module is configured to: perform a security analysis processing on the secure data file based on the file key.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310430510.8A CN104468664A (en) | 2013-09-18 | 2013-09-18 | Method and device for uploading files to cloud storage system, and method and device for downloading files from cloud storage system |
PCT/CN2014/078943 WO2014180416A1 (en) | 2013-09-18 | 2014-05-30 | Method for file upload to cloud storage system, download method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3035641A1 true EP3035641A1 (en) | 2016-06-22 |
EP3035641A4 EP3035641A4 (en) | 2016-08-31 |
Family
ID=51866796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP14794751.9A Withdrawn EP3035641A4 (en) | 2013-09-18 | 2014-05-30 | Method for file upload to cloud storage system, download method and device |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3035641A4 (en) |
CN (1) | CN104468664A (en) |
WO (1) | WO2014180416A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3441903A4 (en) * | 2015-10-14 | 2019-10-23 | Digital Arts Inc. | Access management system, file access system, encryption device, and program |
WO2020086133A1 (en) * | 2018-10-24 | 2020-04-30 | Microsoft Technology Licensing, Llc | Offloading upload processing of a file in a distributed system using a key that includes a hash created using attribute(s) of a requestor and/or the file |
CN115378659A (en) * | 2022-07-28 | 2022-11-22 | 中国电子科技集团公司第三十研究所 | High-reliability file encryption and fine-grained access control method based on user identity |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105025041B (en) * | 2015-08-25 | 2019-03-12 | 北京百度网讯科技有限公司 | The methods, devices and systems that file uploads |
US10887371B2 (en) * | 2015-09-14 | 2021-01-05 | Google Llc | Systems and methods for content storage and retrieval |
CN105357202A (en) * | 2015-11-12 | 2016-02-24 | 中国电子科技网络信息安全有限公司 | Cloud platform user key management device and management method |
CN106060099A (en) * | 2016-08-15 | 2016-10-26 | 北京奇虎科技有限公司 | Data access method and system, and devices |
CN107154945A (en) * | 2017-05-31 | 2017-09-12 | 中南大学 | A kind of cloudy fragmentation method for secure storing and system based on correcting and eleting codes |
CN107704769A (en) * | 2017-09-21 | 2018-02-16 | 北京奇安信科技有限公司 | A kind of data migration method and device based on marking file |
KR102420158B1 (en) * | 2017-12-27 | 2022-07-13 | 삼성전자주식회사 | Storage device and storage system configured to perform encryption based on encryption key in file unit and method of operating using the same |
CN109145602B (en) * | 2018-07-06 | 2020-06-02 | 成都亚信网络安全产业技术研究院有限公司 | Lesso software attack protection method and device |
CN109922142B (en) * | 2019-02-21 | 2022-04-19 | 创新先进技术有限公司 | File downloading method, device and system |
CN111865891B (en) * | 2019-12-31 | 2023-08-15 | 北京嘀嘀无限科技发展有限公司 | Data transmission method, user terminal, electronic equipment and readable storage medium |
CN113553611A (en) * | 2020-04-26 | 2021-10-26 | 中国电信股份有限公司 | File encryption storage method and system, user terminal, cloud platform and storage medium |
CN115484353A (en) * | 2021-06-16 | 2022-12-16 | 中移动信息技术有限公司 | Processing method suitable for watermark picture, electronic equipment and storage medium |
CN113420300B (en) * | 2021-06-21 | 2023-09-08 | 福建天晴数码有限公司 | Method and system for detecting and defending file uploading loopholes |
CN113918981B (en) * | 2021-12-14 | 2022-03-08 | 苏州浪潮智能科技有限公司 | Attribute-based encryption method and system |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001209583A (en) * | 2000-01-26 | 2001-08-03 | Sony Corp | Recorded data regenerator and method for saved data processing and program distribution media |
US8452957B2 (en) * | 2010-04-27 | 2013-05-28 | Telefonaktiebolaget L M Ericsson (Publ) | Method and nodes for providing secure access to cloud computing for mobile users |
US20110289310A1 (en) * | 2010-05-20 | 2011-11-24 | Selgas Thomas D | Cloud computing appliance |
CN103259762B (en) * | 2012-02-16 | 2016-09-28 | 中兴通讯股份有限公司 | A kind of file encryption based on cloud storage, decryption method and system |
CN102685148B (en) * | 2012-05-31 | 2014-10-15 | 清华大学 | Method for realizing secure network backup system under cloud storage environment |
CN103051664B (en) * | 2012-08-14 | 2016-04-27 | 深圳市朗科科技股份有限公司 | A kind of file management method of cloud storage system, device and this cloud storage system |
CN102946440B (en) * | 2012-12-04 | 2015-07-08 | 乐视致新电子科技(天津)有限公司 | Automatic cloud synchronization and recovery system based on cloud storage technology |
-
2013
- 2013-09-18 CN CN201310430510.8A patent/CN104468664A/en not_active Withdrawn
-
2014
- 2014-05-30 EP EP14794751.9A patent/EP3035641A4/en not_active Withdrawn
- 2014-05-30 WO PCT/CN2014/078943 patent/WO2014180416A1/en active Application Filing
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3441903A4 (en) * | 2015-10-14 | 2019-10-23 | Digital Arts Inc. | Access management system, file access system, encryption device, and program |
WO2020086133A1 (en) * | 2018-10-24 | 2020-04-30 | Microsoft Technology Licensing, Llc | Offloading upload processing of a file in a distributed system using a key that includes a hash created using attribute(s) of a requestor and/or the file |
US11184423B2 (en) | 2018-10-24 | 2021-11-23 | Microsoft Technology Licensing, Llc | Offloading upload processing of a file in a distributed system using a key that includes a hash created using attribute(s) of a requestor and/or the file |
CN115378659A (en) * | 2022-07-28 | 2022-11-22 | 中国电子科技集团公司第三十研究所 | High-reliability file encryption and fine-grained access control method based on user identity |
CN115378659B (en) * | 2022-07-28 | 2024-04-16 | 中国电子科技集团公司第三十研究所 | High-reliability file encryption and fine-granularity access control method based on user identity |
Also Published As
Publication number | Publication date |
---|---|
EP3035641A4 (en) | 2016-08-31 |
CN104468664A (en) | 2015-03-25 |
WO2014180416A1 (en) | 2014-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3035641A1 (en) | Method for file upload to cloud storage system, download method and device | |
US9432346B2 (en) | Protocol for controlling access to encryption keys | |
Kaaniche et al. | A secure client side deduplication scheme in cloud storage environments | |
EP3585032B1 (en) | Data security service | |
US9852300B2 (en) | Secure audit logging | |
RU2589861C2 (en) | System and method of user data encryption | |
CN103731395B (en) | The processing method and system of file | |
EP3149651A2 (en) | System and method for secure review of audit logs | |
CN107453880B (en) | Cloud data secure storage method and system | |
Manthiramoorthy et al. | Comparing several encrypted cloud storage platforms | |
WO2019083379A1 (en) | Data transmission | |
KR20210143846A (en) | encryption systems | |
Junghanns et al. | Engineering of secure multi-cloud storage | |
Hussien et al. | Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor | |
Jang-Jaccard et al. | Portable key management service for cloud storage | |
Mata et al. | Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish) | |
Paverd et al. | Omnishare: Encrypted cloud storage for the multi-device era | |
Shah et al. | Third party public auditing scheme for security in cloud storage | |
Thota et al. | Split key management framework for Open Stack Swift object storage cloud | |
Nandini et al. | Implementation of hybrid cloud approach for secure authorized deduplication | |
Karani et al. | Secure File Storage Using Hybrid Cryptography | |
Pritha et al. | Deduplication based storage and retrieval of data from cloud environment | |
Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
Xuan | An End-to-End Encryption Solution for Enterprise Content Applications | |
Patalbansi et al. | Cloud storage system for mobile cloud computing using blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20160315 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20160801 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 29/08 20060101AFI20160726BHEP Ipc: H04L 29/06 20060101ALI20160726BHEP |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20190529 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20190821 |